Cloud Security Threats and Issues-A Review
Keywords:
IAAS, PAAS, SAAS Multi-Tenancy, OrchestratioAbstract
Cloud Computing is one of the best on-demand network access service available to a large shared pool of computing resources in today’s world. There are various economic benefits of cloud computing which are widely recognized. Cloud computing help users to avail benefits of having large storage (IAAS), variety of OS (PAAS) and other softwares (SAAS) at their premises without the need to have them at their own hardware level. Apart from these economic benefits, public clouds still haven’t seen widespread adoption, especially by enterprises. Most large organizations today run private clouds, in the sense of virtualized and geographically distributed data centers, but rarely rely primarily on externally managed resources. Major reason behind this is the security concerns involved in existing cloud infrastructures which includes hardware failures, software bugs, power outrages, server miniconfiguration, malware and inside threats. The aim of this paper is to throw light on various Cloud security threats and issues as well as security issues inherent within the context of cloud computing and cloud infrastructure.
References
. A.A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, Deqing Zou, “Efficient Password based Two Factors Authentication in Cloud Computing”, International Journal of Security and Its Applications, Vol. 6, No. 2 , pp.143-148, 2012
. S. Renu, OHH Parveen, “Biometric Based Approach for Data Sharing in Public Cloud”, International Journal of Advanced Research in Computer and Communication Engineering Vol.4, Issue.2 pp.1-9, 2015
. Mithilesh Mittal, Pradeep Sharma and Pankaj Kumar Gehlot, “A Comparative Study of Security Issues& Challenges of Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.9-15, 2013.
. Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
. R. Buyyaa, C. S. Yeoa, S. Venugopala, J. Broberg, I. Brandic, “Cloud Computing and Emerging IT platforms: Vision Hype and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, Vol.25, Issue.6, pp. 599-616, 2009.
. W. Publishing, J. Wiley, B.Sosinsky, “Cloud Computing Bible” Published by Wiley Publishing, US, pp.1-480, 2010.
. S. Shukla, D. kumar, “Clouds Software- Security as a Service(S-SaaS) via Biometrics”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.119-124, 2014.
. N. Mead, et ai, “Security quality requirements engineering (SQUARE) methodolgy”, ACM SIGSOFT Software Engineering, Vol.30 Issue.4, pp.1-7, 2005
. JW. Rittinghouse, JF. Ransome, “Cloud Computing”, Taylor and Francis Group, US, pp.1-284, 2010.
. A. Bansal, A. Agrawal, “Providing Confidentiality, Integrity and Atomicity for data stored in the cloud storage”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.65-70, 2016.
. Rakesh Prasad Sarang and Rajesh Kumar Bunkar, “Study of Services and Privacy Usage in Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.
. V.K. Saxena, S. Pushkar, “Privacy Preserving using Encryption Proxy in Data Security”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
